-
ebp4
用“提前停止”方法提高BP网络推广能力
本例将用提前停止和训练函数TRAINGDX相结合来避免“过度拟合”产生的误差
(The " early stopping" method to enhance the promotion of BP network capacity will be used in this case in advance and training function to stop the combination of TRAINGDX to avoid " over-fitting" error)
- 2009-05-09 23:48:08下载
- 积分:1
-
210117183512005710194519707843
边缘检测和轮廓跟踪程序,在matlab环境下进行的编程(edge detection and tracking procedures outline of the Matlab environment for programming)
- 2006-05-17 16:49:30下载
- 积分:1
-
hw1
this codw is a simulation of photonic crystal 1 dimentional array dispersion
- 2012-04-24 15:14:59下载
- 积分:1
-
DBF
这是一个Matlab开发的数字波束形成源代码,仿真正确(This is a developed Matlab source code for digital beamforming, simulation correctly)
- 2009-05-14 19:21:02下载
- 积分:1
-
Lyapunov_ex
Lyapunov指数生成程序。该指数是判断系统是否处于混沌状态的有力工具,很好用(Lyapunov index generator. The index is to determine whether the system is a powerful tool in a chaotic state, that is great)
- 2010-11-26 20:16:47下载
- 积分:1
-
orgincode.rar
实现MATLAB控制生成EXCEL XLS数据文件(Generation Excel XLS data files)
- 2007-03-09 17:20:26下载
- 积分:1
-
Ada_Boost
matlab实现的adaboost的代码。(matlab code AdaBoost achieved.)
- 2007-09-18 22:37:54下载
- 积分:1
-
Haar-wavelet-image--processing
说明: 用matlab编写的基于Haar小波变换的图像增强处理,同时可实现小波正变换,小波逆变换,实现小波分解与重构源代码。(Written by matlab Haar wavelet-based image enhancement processing, and can achieve positive wavelet transform, inverse wavelet transform, wavelet decomposition and reconstruction to achieve the source code.)
- 2011-04-09 20:39:46下载
- 积分:1
-
gantry2
Gantry detector tilt correction
- 2013-01-03 02:55:56下载
- 积分:1
-
HEU_KMSActtivator
说明: 本文提出了一种基于混沌加密的DCT域二值图像数字水印算法.该算法首先利用混沌序列将含有版权信息的有意义二值图像水印进行加密,然后利用人眼视觉系统(HVS)的特性将原始载体图像进行块分类,最后将不同强度的水印分量嵌入到不同类的图像块DCT中频系数中去.利用混沌序列对水印进行加密,使水印本身具有安全性,对数字作品进行双重保障.通过高斯噪声,椒盐噪声以及JPEG压缩和剪切等攻击试验,表明了该算法具有较好的鲁棒性.(Encryption in DCT domain is proposed. Firstly, the meaningful binary image watermark containing copyright information is encrypted by using chaotic sequence, and then the original image is classified by using the characteristics of human visual system (HVS), Finally, the watermark components with different intensities are embedded into the DCT intermediate frequency coefficients of different types of image blocks. Chaotic sequences are used to encrypt the watermark, so that the watermark itself has security and double protection for digital works. Experiments on Gaussian noise, salt and pepper noise, JPEG compression and clipping show that the algorithm has good robustness)
- 2021-04-15 12:12:28下载
- 积分:1